GB2375697B - Automatic identity protection system with remote third party monitoring - Google Patents
Automatic identity protection system with remote third party monitoringInfo
- Publication number
- GB2375697B GB2375697B GB0221138A GB0221138A GB2375697B GB 2375697 B GB2375697 B GB 2375697B GB 0221138 A GB0221138 A GB 0221138A GB 0221138 A GB0221138 A GB 0221138A GB 2375697 B GB2375697 B GB 2375697B
- Authority
- GB
- United Kingdom
- Prior art keywords
- remote
- protection system
- party
- identity protection
- party monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/383—Anonymous user system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0414—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/043—Masking or blinding of tables, e.g. lookup, substitution or mapping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
This invention provides an automated system for the processing of data packets, composed of personal identifiers and personal data, such that the personally identifiable data sent by one party may be considered anonymous once received by a second party. The invention uses secret sharing techniques to facilitate distributed key management of the mapping functions and strong authentication to allow the system to be operated remotely.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US19026200P | 2000-03-17 | 2000-03-17 | |
PCT/IB2001/000358 WO2001069839A2 (en) | 2000-03-17 | 2001-03-13 | Automatic identity protection system with remote third party monitoring |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0221138D0 GB0221138D0 (en) | 2002-10-23 |
GB2375697A GB2375697A (en) | 2002-11-20 |
GB2375697B true GB2375697B (en) | 2004-03-24 |
Family
ID=22700614
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0221138A Expired - Lifetime GB2375697B (en) | 2000-03-17 | 2001-03-13 | Automatic identity protection system with remote third party monitoring |
Country Status (10)
Country | Link |
---|---|
US (1) | US7404079B2 (en) |
JP (1) | JP2003527035A (en) |
AU (2) | AU2001244426B2 (en) |
CA (1) | CA2403488C (en) |
DE (1) | DE10195924T1 (en) |
GB (1) | GB2375697B (en) |
IS (1) | IS2078B (en) |
MX (1) | MXPA02008919A (en) |
SE (1) | SE520078C2 (en) |
WO (1) | WO2001069839A2 (en) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7457948B1 (en) * | 2000-09-29 | 2008-11-25 | Lucent Technologies Inc. | Automated authentication handling system |
FR2847401A1 (en) * | 2002-11-14 | 2004-05-21 | France Telecom | Access to a network service with rapid, revokable anonymous authentication and session creation and maintenance for online auctions, uses anonymous certificate of authority to produce anonymous signature which can be checked if needed |
US8321946B2 (en) * | 2003-12-05 | 2012-11-27 | Hewlett-Packard Development Company, L.P. | Method and system for preventing identity theft in electronic communications |
US8146141B1 (en) * | 2003-12-16 | 2012-03-27 | Citibank Development Center, Inc. | Method and system for secure authentication of a user by a host system |
US7640594B2 (en) * | 2004-01-21 | 2009-12-29 | Sap Ag | Secure storage in a file system |
US8424054B2 (en) * | 2008-03-10 | 2013-04-16 | Mitsubishi Electric Corporation | Secret information management apparatus, information processing apparatus, and secret information management system |
US9425960B2 (en) * | 2008-10-17 | 2016-08-23 | Sap Se | Searchable encryption for outsourcing data analytics |
US8782151B2 (en) * | 2008-12-19 | 2014-07-15 | PrivateTree, LLC | Systems and methods for facilitating relationship management |
US20100262836A1 (en) * | 2009-04-13 | 2010-10-14 | Eric Peukert | Privacy and confidentiality preserving mapping repository for mapping reuse |
US20100313009A1 (en) * | 2009-06-09 | 2010-12-09 | Jacques Combet | System and method to enable tracking of consumer behavior and activity |
US9621584B1 (en) * | 2009-09-30 | 2017-04-11 | Amazon Technologies, Inc. | Standards compliance for computing data |
US8799022B1 (en) * | 2011-05-04 | 2014-08-05 | Strat ID GIC, Inc. | Method and network for secure transactions |
KR101575282B1 (en) * | 2011-11-28 | 2015-12-09 | 한국전자통신연구원 | Agent device and method for sharing security information based on anonymous identifier between security management domains |
US8793805B1 (en) | 2012-07-30 | 2014-07-29 | Amazon Technologies, Inc. | Automatic application dependent anonymization |
US9419953B2 (en) | 2012-12-23 | 2016-08-16 | Mcafee, Inc. | Trusted container |
US8955075B2 (en) | 2012-12-23 | 2015-02-10 | Mcafee Inc | Hardware-based device authentication |
US8850543B2 (en) | 2012-12-23 | 2014-09-30 | Mcafee, Inc. | Hardware-based device authentication |
US11403711B1 (en) | 2013-12-23 | 2022-08-02 | Massachusetts Mutual Life Insurance Company | Method of evaluating heuristics outcome in the underwriting process |
US10489861B1 (en) | 2013-12-23 | 2019-11-26 | Massachusetts Mutual Life Insurance Company | Methods and systems for improving the underwriting process |
US9633209B1 (en) | 2014-02-21 | 2017-04-25 | Amazon Technologies, Inc. | Chaining of use case-specific entity identifiers |
US9344409B2 (en) * | 2014-07-18 | 2016-05-17 | Bank Of America Corporation | Method and apparatus for masking non-public data elements in uniform resource indentifiers (“URI”) |
US10320574B2 (en) | 2017-05-05 | 2019-06-11 | International Business Machines Corporation | Blockchain for open scientific research |
JP7287096B2 (en) * | 2019-05-09 | 2023-06-06 | 大日本印刷株式会社 | Information processing device, control method and program |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3962539A (en) * | 1975-02-24 | 1976-06-08 | International Business Machines Corporation | Product block cipher system for data security |
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US5825890A (en) * | 1995-08-25 | 1998-10-20 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
EP0899918A2 (en) * | 1997-08-28 | 1999-03-03 | Lucent Technologies Inc. | System and method for providing anonymous remailing and filtering of electronic mail |
US5907677A (en) * | 1996-08-23 | 1999-05-25 | Ecall Inc. | Method for establishing anonymous communication links |
US5923842A (en) * | 1997-03-06 | 1999-07-13 | Citrix Systems, Inc. | Method and apparatus for simultaneously providing anonymous user login for multiple users |
US6023510A (en) * | 1997-12-24 | 2000-02-08 | Philips Electronics North America Corporation | Method of secure anonymous query by electronic messages transported via a public network and method of response |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5638445A (en) * | 1995-09-19 | 1997-06-10 | Microsoft Corporation | Blind encryption |
CA2264912C (en) * | 1996-09-06 | 2002-11-19 | Walker Asset Management Limited Partnership | Method and system for establishing and maintaining user-controlled anonymous communications |
US5903652A (en) * | 1996-11-25 | 1999-05-11 | Microsoft Corporation | System and apparatus for monitoring secure information in a computer network |
US5961593A (en) * | 1997-01-22 | 1999-10-05 | Lucent Technologies, Inc. | System and method for providing anonymous personalized browsing by a proxy system in a network |
US7143438B1 (en) * | 1997-09-12 | 2006-11-28 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with multiple domain support |
US6081793A (en) * | 1997-12-30 | 2000-06-27 | International Business Machines Corporation | Method and system for secure computer moderated voting |
US6151631A (en) * | 1998-10-15 | 2000-11-21 | Liquid Audio Inc. | Territorial determination of remote computer location in a wide area network for conditional delivery of digitized products |
DE19914631A1 (en) * | 1999-03-31 | 2000-10-12 | Bosch Gmbh Robert | Input procedure in a driver information system |
-
2001
- 2001-03-13 WO PCT/IB2001/000358 patent/WO2001069839A2/en active Application Filing
- 2001-03-13 CA CA2403488A patent/CA2403488C/en not_active Expired - Lifetime
- 2001-03-13 MX MXPA02008919A patent/MXPA02008919A/en active IP Right Grant
- 2001-03-13 JP JP2001567171A patent/JP2003527035A/en active Pending
- 2001-03-13 DE DE10195924T patent/DE10195924T1/en not_active Ceased
- 2001-03-13 AU AU2001244426A patent/AU2001244426B2/en not_active Expired
- 2001-03-13 GB GB0221138A patent/GB2375697B/en not_active Expired - Lifetime
- 2001-03-13 AU AU4442601A patent/AU4442601A/en active Pending
- 2001-03-15 US US09/808,720 patent/US7404079B2/en not_active Expired - Lifetime
-
2002
- 2002-09-13 IS IS6547A patent/IS2078B/en unknown
- 2002-09-13 SE SE0202712A patent/SE520078C2/en not_active IP Right Cessation
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3962539A (en) * | 1975-02-24 | 1976-06-08 | International Business Machines Corporation | Product block cipher system for data security |
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US5825890A (en) * | 1995-08-25 | 1998-10-20 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
US5907677A (en) * | 1996-08-23 | 1999-05-25 | Ecall Inc. | Method for establishing anonymous communication links |
US5923842A (en) * | 1997-03-06 | 1999-07-13 | Citrix Systems, Inc. | Method and apparatus for simultaneously providing anonymous user login for multiple users |
EP0899918A2 (en) * | 1997-08-28 | 1999-03-03 | Lucent Technologies Inc. | System and method for providing anonymous remailing and filtering of electronic mail |
US6023510A (en) * | 1997-12-24 | 2000-02-08 | Philips Electronics North America Corporation | Method of secure anonymous query by electronic messages transported via a public network and method of response |
Also Published As
Publication number | Publication date |
---|---|
MXPA02008919A (en) | 2003-02-12 |
AU4442601A (en) | 2001-09-24 |
CA2403488A1 (en) | 2001-09-20 |
WO2001069839A2 (en) | 2001-09-20 |
GB2375697A (en) | 2002-11-20 |
WO2001069839A3 (en) | 2002-03-07 |
US7404079B2 (en) | 2008-07-22 |
SE0202712D0 (en) | 2002-09-13 |
AU2001244426B2 (en) | 2006-06-08 |
IS2078B (en) | 2006-02-15 |
IS6547A (en) | 2002-09-13 |
GB0221138D0 (en) | 2002-10-23 |
SE0202712L (en) | 2002-10-29 |
DE10195924T1 (en) | 2003-04-24 |
CA2403488C (en) | 2011-10-18 |
JP2003527035A (en) | 2003-09-09 |
US20010027519A1 (en) | 2001-10-04 |
SE520078C2 (en) | 2003-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2375697B (en) | Automatic identity protection system with remote third party monitoring | |
US20160277933A1 (en) | Secure Data Communication system between IoT smart devices and a Network gateway under Internet of Thing environment | |
WO2006086721A3 (en) | Context limited shared secret | |
WO2004081719A3 (en) | Methods and systems for digital rights management of protected content | |
WO2004057444A3 (en) | Using trusted communication channel to combat user name/password theft | |
WO2010011731A3 (en) | Methods and systems for secure key entry via communication networks | |
WO2004025418A3 (en) | System and method for encrypted communications between electronic devices | |
BR0315078A (en) | Tamper-resistant security device, user terminal, and network server | |
WO2009031112A3 (en) | Node for a network and method for establishing a distributed security architecture for a network | |
WO2005052754A3 (en) | Secure network access devices with data encryption | |
WO2004046849A3 (en) | Cryptographic methods and apparatus for secure authentication | |
WO2007149977A3 (en) | Location-based security, privacy, access control and monitoring system | |
CA2576622A1 (en) | System and method for controlling data communications between a server and a client device | |
WO2004049620A8 (en) | System and method for securely installing a cryptographic system on a secure device | |
WO1998045981A3 (en) | Cryptographic system and protocol for establishing secure authenticated remote access | |
WO2005059717A3 (en) | Certificate based digital rights management | |
WO2008054407A3 (en) | Asynchronous encryption for secured electronic communications | |
WO2006002926A3 (en) | Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card | |
WO2011159715A3 (en) | Key management systems and methods for shared secret ciphers | |
WO2004046846A3 (en) | Automatically generated cryptographic functions for renewable tamper resistant security systems | |
WO2003010942A3 (en) | System and method for improved security in a handset reprovisioning and reprogramming | |
WO2007084863A3 (en) | Privacy protection in communication systems | |
US9240978B2 (en) | Communication system having message encryption | |
FI20020688A0 (en) | Method and arrangement for controlling access | |
MY138993A (en) | Multiple pairing control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PE20 | Patent expired after termination of 20 years |
Expiry date: 20210312 |